Try our new research platform with insights from 80,000+ expert users

Netwrix Data Classification vs Ping Identity Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 3, 2024
 

Categories and Ranking

Netwrix Data Classification
Ranking in Data Governance
32nd
Average Rating
0.0
Reviews Sentiment
7.6
Number of Reviews
2
Ranking in other categories
No ranking in other categories
Ping Identity Platform
Ranking in Data Governance
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
28
Ranking in other categories
Single Sign-On (SSO) (4th), Authentication Systems (5th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Access Management (3rd), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
 

Featured Reviews

Simonas Palevicius - PeerSpot reviewer
A comprehensive data classification and information security solution that offers robust functionality, scalability, and competitive pricing
The standout aspect of this solution is its price performance. It's highly flexible and scalable, offering customers the choice to match their needs and budget. It is also user-friendly and effective. Even if you opt for just one module, such as Active Directory, you'll immediately see automated, valuable insights when you install and run the auditor. From a network perspective, it offers an array of well-structured rules. Unlike other systems that require extensive configurations, Netwrix simplifies the process. It's more intuitive and forgiving, meaning you don't need to be an expert to get value from it. Its strength lies in its predefined rules that generate automated reports and more without requiring in-depth knowledge of the system.
Dilip Reddy - PeerSpot reviewer
Easy to use but requires improvements in the area of stability
In my company, we have worked on authorization, and I know that there are different types of grants. We have worked on the authorization code, client credentials, and ROPC grant. There are two types of tokens, like the JWT token and internally managed reference tokens. JWT tokens are useful for finding information related to the claim requests. Internally managed reference tokens are useful for dealing with visual data and information. For the clients to fit the user information, they need to do additional work to fit all the user info into the site, which is to define and validate the token issue and provide the request for VPNs. I worked on the key differences between the authorization code and implicit grant. In the authorization code type, you will have the authorization code issued initially to the client, and the client has to exchange it with the authorization server, like using a DAC channel to get the access token. In implicit grants, tokens are issued right away if the application is a single-page application. We can either use the authorization code or an implicit grant.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Netwrix Data Classification Manager finds the data in a very efficient manner, and the efficacy of the solution is very good."
"It's highly flexible and scalable, offering customers the choice to match their needs and budget."
"Setting up the infrastructure with Ping Identity Platform is very easy compared to other IAM products."
"We use the product to run different reports."
"It's pretty stable as a product."
"The product's most valuable features include its cloud-based capabilities for handling cloud applications and providing authentication and authorization through OIDC and SAML. It also supports integrations needed for both local and internal applications, including legacy applications requiring web server access."
"I work on the application onboarding process because we have multiple customers and get data from different sources."
"The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logging in."
"This is a user-friendly solution."
"It is a scalable solution...It is a stable solution."
 

Cons

"One of the key issues is its interface and querying capabilities, which can be complex, making it difficult to interpret logs."
"Netwrix Data Classification Manager is very good at network data classification, but it also has to work on endpoint data classification because clients ask for it."
"I think that the connection with like Microsoft Word, especially for Office 365, is a weak point that could be improved."
"PingID classifies the type of environment into internal and external, which is an area for improvement because you need to take additional steps to trust internal and external users."
"In Ping Identity, we have had some issues. We've worked with logging and troubleshooting, including some firewall and security issues."
"PingID would benefit from a better user interface for integration."
"It has a long way to go until it is a cloud-based solution."
"If the solution is going to compete with Microsoft, they need to offer more unique functionality to keep their current user base."
"We can choose a drop-down to search for which certificate we have to create, which is difficult."
"We have encountered instances where it is not easy to do authentication."
 

Pricing and Cost Advice

"Netwrix Data Classification Manager has an affordable price."
"The initial pricing might seem reasonable, but costs can quickly escalate when adding components."
"Ping offers flexible pricing that's not standardized."
"Ping Identity Platform is not an expensive solution."
"The product is costly."
"Compared to some SaaS-based solutions, the platform is relatively cost-effective."
"Ping Identity Platform is not very expensive."
"The tool is quite affordable."
"The pricing is neither too expensive nor too cheap."
"PingID's pricing is pretty competitive."
report
Use our free recommendation engine to learn which Data Governance solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Government
15%
Computer Software Company
15%
University
7%
Financial Services Firm
25%
Computer Software Company
10%
Manufacturing Company
9%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Netwrix Data Classification Manager?
Netwrix Data Classification Manager finds the data in a very efficient manner, and the efficacy of the solution is very good.
What is your experience regarding pricing and costs for Netwrix Data Classification Manager?
Netwrix Data Classification Manager has an affordable price. Since the solution is priced according to the client's market size, everybody can afford it.
What needs improvement with Netwrix Data Classification Manager?
Netwrix Data Classification Manager is very good at network data classification, but it also has to work on endpoint data classification because clients ask for it. Although the solution is easy to...
What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
 

Also Known As

No data available
Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
 

Overview

 

Sample Customers

Information Not Available
Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Find out what your peers are saying about Netwrix Data Classification vs. Ping Identity Platform and other solutions. Updated: December 2024.
824,067 professionals have used our research since 2012.